Patents by Inventor Luciana Costa
Luciana Costa has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 12089034Abstract: A method of protecting the exchange of privacy-sensitive data in a wireless communication network, the method including generating and providing a public cryptographic key to a first entity, possessing the data to be sent to the network through a wireless connection; generating and providing a private secret cryptographic key to a second entity, being the intended recipient of the data, the private key being bound to the public key and being associated to privacy support context information to identify the network; having the network send to the first entity respective wireless network privacy support context information; having the first entity receive the information and encrypt the data using the public key and the received information to obtain protected, encrypted privacy-sensitive data; having the first entity send to the second entity through the network the encrypted data; and having the second entity decrypt the encrypted data exploiting the private key.Type: GrantFiled: May 30, 2016Date of Patent: September 10, 2024Assignee: TELECOM ITALIA S.p.A.Inventors: Madalina Baltatu, Luciana Costa, Roberta D'Amico, Jovan Golic, Dario Lombardo
-
Publication number: 20200322794Abstract: A method of protecting the exchange of privacy-sensitive data in a wireless communication network, the method including generating and providing a public cryptographic key to a first entity, possessing the data to be sent to the network through a wireless connection; generating and providing a private secret cryptographic key to a second entity, being the intended recipient of the data, the private key being bound to the public key and being associated to privacy support context information to identify the network; having the network send to the first entity respective wireless network privacy support context information; having the first entity receive the information and encrypt the data using the public key and the received information to obtain protected, encrypted privacy-sensitive data; having the first entity send to the second entity through the network the encrypted data; and having the second entity decrypt the encrypted data exploiting the private key.Type: ApplicationFiled: May 30, 2016Publication date: October 8, 2020Applicant: TELECOM ITALIA S.p.A.Inventors: Madalina BALTATU, Luciana COSTA, Roberto D'AMICO, Jovan GOLIC, Dario LOMBARDO
-
Patent number: 9015473Abstract: In a communications network including at least one authentication entity adapted to authenticating a network access requestor in order to conditionally grant thereto access to the communications network, wherein the authenticating is based on public key cryptography, a method for automatically provisioning the network access requestor with service access credentials for accessing an on-line service offered by an on-line service provider accessible through the communications network.Type: GrantFiled: November 30, 2005Date of Patent: April 21, 2015Assignee: Telecom Italia S.p.A.Inventors: Luciana Costa, Paolo De Lutiis, Federico Frosali
-
Patent number: 8621201Abstract: In a wireless communications network including at least one authenticator and at least one authentication server, wherein the authenticator is adapted to interact with the authentication server for authenticating supplicants in order to conditionally grant thereto access to the wireless communications network, a short authentication method for authenticating a supplicant, the method including: providing a shared secret, shared by and available at the supplicant and the authentication server; having the supplicant provide to the authenticator an authentication token, wherein the authentication token is based on the shared secret available thereat; having the authenticator forward the authentication token to the authentication server; having the authentication server ascertain an authenticity of the received authentication token based on the shared secret available thereat; in case the authenticity of the authentication token is ascertained, having the authentication server generate a first authentication key bType: GrantFiled: June 29, 2005Date of Patent: December 31, 2013Assignee: Telecom Italia S.p.A.Inventors: Luciana Costa, Giorgio Freguglia, Federico Frosali, Romano Fantacci, Leonardo Maccari, Tommaso Pecorella
-
Patent number: 8561200Abstract: A system for controlling access of a mobile terminal to a communication network including a set of terminals, wherein said mobile terminal obtains access to the network as a result of a successful authentication procedure. The system includes an authenticator module for performing the authentication procedure of the mobile terminal and a communication mechanism configured for making the successful outcome of the authentication procedure known to the terminals in the set. The mobile terminal is thus permitted to access the network via any of the terminals in the set based on the authentication procedure.Type: GrantFiled: June 24, 2004Date of Patent: October 15, 2013Assignee: Telecom Italia S.p.A.Inventors: Luciana Costa, Simone Ruffino, Patrick Stupar
-
Patent number: 8490159Abstract: A method for security in a passive optical network is disclosed. The method includes, at an optical line termination (OLT): detecting an optical termination device and establishing a connection with the device; generating a first authentication message including a first random number; and transmitting the first authentication message through the established connection. At the optical termination device, the method may include: receiving the first authentication message; calculating a first authentication code by using the first random number and a secret code stored at the device; and generating and transmitting to the OLT a second authentication message including the first authentication code.Type: GrantFiled: November 3, 2008Date of Patent: July 16, 2013Assignee: Telecom Italia S.p.A.Inventors: Luciana Costa, Roberta D'Amico, Paolo De Lutiis, Manuel Leone, Maurizio Valvo, Paolo Solina
-
Patent number: 8370894Abstract: A method of enforcing security policies in a mobile ad-hoc network, includes: entrusting at least one first network node along a data traffic route from a data traffic origin node to a data traffic destination node, with the enforcing of predefined security policies on the data traffic; and entrusting at least one second network node, distinct from said first network node, with the control of the enforcement of the security policies by the first network node.Type: GrantFiled: December 29, 2006Date of Patent: February 5, 2013Assignee: Telecom Italia S.p.A.Inventors: Luciana Costa, Giorgio Freguglia, Federico Frosali
-
Patent number: 8145057Abstract: A method for localizing an optical network termination (ONT) of a passive optical network is disclosed. The passive optical network comprises an optical line terminal (OLT) and an optical distribution network (ODN) having a plurality of optical links. The ONT is connectable to the OLT by a given optical link of the optical distribution network. The method includes the steps of detecting that the ONT has been connected to the OLT by an optical link of the optical distribution network; determining length information indicative of a length of the optical link; comparing the length information with a reference length information indicative of a length of the given optical link; and if the length information matches the reference length information, localizing the ONT by confirming that it is connected to the OLT by the given optical link.Type: GrantFiled: December 29, 2008Date of Patent: March 27, 2012Assignee: Telecom Italia S.p.A.Inventors: Luciana Costa, Roberta D'Amico, Paolo De Lutiis, Luca Viale
-
Publication number: 20110262139Abstract: A method for localizing an optical network termination (ONT) of a passive optical network is disclosed. The passive optical network comprises an optical line terminal (OLT) and an optical distribution network (ODN) having a plurality of optical links. The ONT is connectable to the OLT by a given optical link of the optical distribution network. The method includes the steps of detecting that the ONT has been connected to the OLT by an optical link of the optical distribution network; determining length information indicative of a length of the optical link; comparing the length information with a reference length information indicative of a length of the given optical link; and if the length information matches the reference length information, localizing the ONT by confirming that it is connected to the OLT by the given optical link.Type: ApplicationFiled: December 29, 2008Publication date: October 27, 2011Applicant: TELECOM ITALIA S.P.A.Inventors: Luciana Costa, Roberta D'Amico, Paolo De Lutiis, Luca Viale
-
Publication number: 20110214160Abstract: A method for security in a passive optical network is disclosed. The method includes, at an optical line termination (OLT): detecting an optical termination device and establishing a connection with the device; generating a first authentication message including a first random number; and transmitting the first authentication message through the established connection. At the optical termination device, the method may include: receiving the first authentication message; calculating a first authentication code by using the first random number and a secret code stored at the device; and generating and transmitting to the OLT a second authentication message including the first authentication code.Type: ApplicationFiled: November 3, 2008Publication date: September 1, 2011Applicant: TELECOM ITALIA S.P.A.Inventors: Luciana Costa, Roberta D'Amico, Paolo De Lutiis, Manuel Leone, Maurizio Valvo, Paolo Solina
-
Patent number: 7706788Abstract: At least one user is given access to a respective home operator over a communication network such as an IP network, via an access network and through any of a plurality of supported visited networks. The user is communicated a list of the supported visited networks and is thus given the possibility of selecting one of the supported visited networks as the path for reaching the respective home operator.Type: GrantFiled: June 30, 2003Date of Patent: April 27, 2010Assignee: Telecom Italia S.p.A.Inventors: Antonio Ascolese, Luciana Costa, Luca Dell'Uomo, Simone Ruffino, Marco Spini
-
Publication number: 20100058442Abstract: A method of enforcing security policies in a mobile ad-hoc network, includes: entrusting at least one first network node along a data traffic route from a data traffic origin node to a data traffic destination node, with the enforcing of predefined security policies on the data traffic; and entrusting at least one second network node, distinct from said first network node, with the control of the enforcement of the security policies by the first network node.Type: ApplicationFiled: December 26, 2006Publication date: March 4, 2010Inventors: Luciana Costa, Giorgio Freguglia, Federico Frosali
-
Publication number: 20090217033Abstract: In a wireless communications network including at least one authenticator and at least one authentication server, wherein the authenticator is adapted to interact with the authentication server for authenticating supplicants in order to conditionally grant thereto access to the wireless communications network, a short authentication method for authenticating a supplicant, the method including: providing a shared secret, shared by and available at the supplicant and the authentication server; having the supplicant provide to the authenticator an authentication token, wherein the authentication token is based on the shared secret available thereat; having the authenticator forward the authentication token to the authentication server; having the authentication server ascertain an authenticity of the received authentication token based on the shared secret available thereat; in case the authenticity of the authentication token is ascertained, having the authentication server generate a first authentication key bType: ApplicationFiled: June 29, 2005Publication date: August 27, 2009Inventors: Luciana Costa, Giorgio Freguglia, Federico Frosali, Romano Fantacci, Leonardo Maccari, Tommaso Pecorella
-
Publication number: 20090158032Abstract: In a communications network including at least one authentication entity adapted to authenticating a network access requestor in order to conditionally grant thereto access to the communications network, wherein the authenticating is based on public key cryptography, a method for automatically provisioning the network access requestor with service access credentials for accessing an on-line service offered by an on-line service provider accessible through the communications network.Type: ApplicationFiled: November 30, 2005Publication date: June 18, 2009Applicant: TELECOM ITALIA S.P.A.Inventors: Luciana Costa, Paolo De Lutiis, Federico Frosali
-
Publication number: 20080069105Abstract: A system for controlling access of a mobile terminal to a communication network including a set of terminals, wherein said mobile terminal obtains access to the network as a result of a successful authentication procedure. The system includes an authenticator module for performing the authentication procedure of the mobile terminal and a communication mechanism configured for making the successful outcome of the authentication procedure known to the terminals in the set. The mobile terminal is thus permitted to access the network via any of the terminals in the set based on the authentication procedure.Type: ApplicationFiled: June 24, 2004Publication date: March 20, 2008Applicant: TELECOM ITALIA S.p.A.Inventors: Luciana Costa, Simone Ruffino, Patrick Stupar
-
Publication number: 20060153135Abstract: At least one user is given access to a respective home operator over a communication network such as an IP network, via an access network and through any of a plurality of supported visited networks. The user is communicated a list of the supported visited networks and is thus given the possibility of selecting one of the supported visited networks as the path for reaching the respective home operator.Type: ApplicationFiled: June 30, 2003Publication date: July 13, 2006Inventors: Antonio Ascolese, Luciana Costa, Luca Dell'Uomo, Simone Ruffino, Marco Spini